CVE-2018-18541
20.10.2018, 22:29
In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.Enginsight
Vendor | Product | Version |
---|---|---|
teeworlds | teeworlds | 𝑥 < 0.6.5 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References